You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: how-to
16
16
ms.subservice: android
17
17
search.appverid: met150
18
-
ms.date: 10/23/2025
18
+
ms.date: 11/06/2025
19
19
appliesto:
20
20
- Microsoft Defender for Endpoint Plan 1
21
21
- Microsoft Defender for Endpoint Plan 2
@@ -33,7 +33,7 @@ For more information about how to set up Defender for Endpoint on Android and Co
33
33
## Configure custom indicators
34
34
35
35
> [!NOTE]
36
-
> Defender for Endpoint on Android only supports creating custom indicators for IP addresses and URLs/domains.
36
+
> Defender for Endpoint on Android supports creating custom indicators only for URLs and domains. IP-based custom indicators aren't supported on Android.
37
37
>
38
38
> IP `245.245.0.1` is an internal Defender IP and should not be included in custom indicators by customers to avoid any functionality issues.
39
39
> Also, alerts for custom indicators are currently not supported for Defender for Endpoint on Android.
Copy file name to clipboardExpand all lines: defender-endpoint/api/exposed-apis-create-app-webapp.md
+2-8Lines changed: 2 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,6 +50,8 @@ Having the [Microsoft Entra role](/entra/identity/role-based-access-control/mana
50
50
51
51
## Step 2: Add a secret to your app
52
52
53
+
This section describes authenticating your app using an app secret. To authenticate your app using a certificate, see [Create a self-signed public certificate to authenticate your application](/entra/identity-platform/howto-create-self-signed-certificate).
54
+
53
55
1. From the application page, select *Certificates & secrets* > *New client secret*.
54
56
55
57
2. In the *Add a client secret* pane, add a description and expiration date.
@@ -163,11 +165,3 @@ var request = new HttpRequestMessage(HttpMethod.Get, "https://api.securitycenter
163
165
request.Headers.Authorization = new AuthenticationHeaderValue("Bearer", token);
164
166
var response = httpClient.SendAsync(request).GetAwaiter().GetResult();
165
167
```
166
-
167
-
## See also
168
-
169
-
*[Get access with user context](exposed-apis-create-app-nativeapp.md)
170
-
171
-
*[Supported Microsoft Defender for Endpoint APIs](exposed-apis-list.md)
172
-
173
-
*[Access Microsoft Defender for Endpoint on behalf of a user](exposed-apis-create-app-nativeapp.md)
<td><center><ahref="microsoft-defender-endpoint.md#edr"><imgsrc="media/edr-icon.png"alt="Endpoint detection and response"><br> <b>Endpoint detection and response</b></a></center></td>
46
-
<td><center><ahref="microsoft-defender-endpoint.md#ai"><imgsrc="media/air-icon.png"alt="Automated investigation and remediation"><br> <b>Automated investigation and remediation</b></a></center></td>
<td><center><ahref="overview-endpoint-detection-response.md"><imgsrc="media/edr-icon.png"alt="Endpoint detection and response"><br> <b>Endpoint detection and response</b></a></center></td>
46
+
<td><center><ahref="automated-investigations.md"><imgsrc="media/air-icon.png"alt="Automated investigation and remediation"><br> <b>Automated investigation and remediation</b></a></center></td>
Copy file name to clipboardExpand all lines: defender-endpoint/indicators-overview.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -119,6 +119,11 @@ When your security team creates a new indicator (IoC), the following actions are
119
119
> [!NOTE]
120
120
> Using Warn mode prompts users with a warning if they open a risky app or website. The prompt doesn't block them from allowing the application or website to run, but you can provide a custom message and links to a company page that describes appropriate usage of the app. Users can still bypass the warning and continue to use the app if necessary. For more information, see [Govern apps discovered by Microsoft Defender for Endpoint](/defender-cloud-apps/mde-govern).
121
121
122
+
> [!NOTE]
123
+
> For Warn action, To receive the toast notification to be able to bypass the IoC, make sure the **“Files or activities are blocked”** option is enabled under **Virus & Threat Protection notifications**. The corresponding registry key should be set as follows: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows Defender Security Center\Virus and threat protection\FilesBlockedNotificationDisabled = 0.
124
+
>
125
+
> More details see **[Windows Security app settings](https://support.microsoft.com/windows/windows-security-app-settings-1ec98620-4e41-4b6b-b055-3c4bb115d4ee#bkmk_notifications)**.
Copy file name to clipboardExpand all lines: defender-endpoint/ios-whatsnew.md
+16-2Lines changed: 16 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: lwainstein
6
6
author: limwainstein
7
7
ms.reviewer: sunasing; denishdonga
8
8
ms.localizationpriority: medium
9
-
ms.date: 09/05/2025
9
+
ms.date: 11/06/2025
10
10
manager: bagol
11
11
audience: ITPro
12
12
ms.collection:
@@ -29,11 +29,25 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
29
29
30
30
## Releases for Defender for Endpoint on iOS
31
31
32
+
#### November 2025
33
+
34
+
| Build| 1.1.70290103|
35
+
| -------- | -------- |
36
+
| Release Date |November 6, 2025|
37
+
38
+
**What's New**
39
+
40
+
- An improved user feedback experience: See [Key Changes - November 2025](./ios-new-ux.md#key-changes---november-2025) for details.
41
+
42
+
- Added Landscape mode UI support for the Defender app.
43
+
44
+
- Additional telemetry features to improve app performance monitoring and detect specific scenarios, such as entering landscape mode or invalid authentication attempts.
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-overview.md
+2-6Lines changed: 2 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
---
1
+
---
2
2
title: Device control for macOS
3
3
description: Learn how to configure Microsoft Defender for Endpoint on Mac to reduce threats from removable storage such as USB devices.
4
4
ms.service: defender-endpoint
@@ -27,11 +27,7 @@ appliesto:
27
27
28
28
## Requirements
29
29
30
-
Device control for macOS has the following prerequisites:
31
-
32
-
- Defender for Endpoint or Defender for Business licenses (can be a trial subscription)
33
-
- Minimum OS version: macOS 11 or higher
34
-
- Minimum product version: `101.34.20`
30
+
Device control for macOS is available on the versions listed in the [System requirements](/defender-endpoint/microsoft-defender-endpoint-mac) section of Defender for Endpoint on macOS documentation.
0 commit comments